Re: [dns-operations] [Ext] K-root in CN leaking outside of CN

2021-11-07 Thread Ray Bellis
On 07/11/2021 09:28, Ray Bellis wrote: There most certainly were - a similar leak/poison pattern was detected from an I root node hosted in China in March 2010. and checking our own records, we've had F root servers in China since at least 2006. However we announce our Anycast prefixes

Re: [dns-operations] [Ext] K-root in CN leaking outside of CN

2021-11-07 Thread Ray Bellis
On 06/11/2021 20:20, Manu Bretelle wrote: I believe back in 2013 there were no root servers in China There most certainly were - a similar leak/poison pattern was detected from an I root node hosted in China in March 2010. I recall the date because Roy Arends and I had previously been

Re: [dns-operations] .iq contacts?

2020-05-28 Thread Ray Bellis
On 28/05/2020 22:56, Viktor Dukhovni wrote: > Indeed this looks rather precarious, and the SOA serial number is not > any higher on the other remaining server, the expiration time is 7 days, > so not much time left if the primary went down in the 21st. > > The MX record for cmc.iq is: cmc.iq.

[dns-operations] .iq contacts?

2020-05-28 Thread Ray Bellis
that happens there'll only be one functioning NS for the ccTLD, and for all I know that one might be about to expire the zone too. thanks, Ray Bellis Director of DNS Operations, ISC. ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Ray Bellis
On 02/04/2020 11:10, Davey Song wrote: > I'm very confused that why people on the list are suggesting RRL (even > BCP38) to the victim of DoS attack? If I remember correctly, the goal of > both RRL and BCP38 is to reduce the chance of participating the attack > as a innocent helper. > > In the

Re: [dns-operations] solutions for DDoS mitigation of DNS

2020-04-02 Thread Ray Bellis
On 02/04/2020 10:12, Tessa Plum wrote: > All the packages were DNS requests, some queries like 'dig domain.com any'. > but their IP address seems spoofed. > A request from the fake address to our nameserver, but nameserver try > its best to reply to this unreal address. If it's a recursive

Re: [dns-operations] [Ext] Something happening in the root?

2020-02-25 Thread Ray Bellis
On 25/02/2020 18:45, Paul Wouters wrote: > I understand mistakes happen, and we can look forward at improved > monitoring of the root zone and its anycast clouds. But this statement > in the report seems a weak excuse for lowering the bar of expectations > we have from root zone operators. That

Re: [dns-operations] [Ext] Something happening in the root?

2020-02-22 Thread Ray Bellis
On 30/01/2020 13:30, Ray Bellis wrote: > We won't be publishing anything before then, but in practise any public > report is unlikely to say much that wasn't already disclosed on the day > (see my email of 21:44 UTC on 2020/01/23). Our incident report is now online at: <https:/

Re: [dns-operations] [Ext] Something happening in the root?

2020-01-30 Thread Ray Bellis
On 30/01/2020 11:19, Bill Woodcock wrote: > So it’s been a week… Cloudflare folks, have you published a post-incident > analysis yet? ISC has scheduled a post-mortem meeting with Cloudflare during NANOG. We won't be publishing anything before then, but in practise any public report is

Re: [dns-operations] [Ext] Something happening in the root?

2020-01-23 Thread Ray Bellis
which was causing some resolvers to have issues. The cause was identified, and so far as possible routes to those nodes were withdrawn while a fix was being rolled out. The fix is now in place and the prefixes are being re-advertised. Ray Bellis Director of DNS Operation

Re: [dns-operations] glitch on [ip6|in-addr].arpa?

2019-10-10 Thread Ray Bellis
8.046 ms 4 100ge10-2.core1.lax1.he.net 65.768 ms 63.279 ms 62.687 ms 5 * * * 6 * * * 7 * * * 8 * * * 9 * *^C Thanks for the report - we'll look into this. Ray Bellis Director of DNS Operations, ISC. ___ dns

Re: [dns-operations] resolvers considered harmful

2014-11-06 Thread Ray Bellis
On 23 Oct 2014, at 16:11, David Conrad d...@virtualized.orgmailto:d...@virtualized.org wrote: On Oct 23, 2014, at 6:29 AM, Jelte Jansen jelte.jan...@sidn.nlmailto:jelte.jan...@sidn.nl wrote: I do not think putting multiple questions in one request isn't reliably possible without heavy protocol

Re: [dns-operations] DNS namespace collisions and controlled interruption

2014-01-10 Thread Ray Bellis
On 10 Jan 2014, at 11:28, Stephane Bortzmeyer bortzme...@nic.fr wrote: I suspect that, in many cases, the leak comes from systems which are not under the direct control of the system administrator. 1) Jane Sysadmin, who works for Acme Corp, decides (wrongly) to use .HOME for the local

Re: [dns-operations] Geoff Huston on DNS-over-TCP-only study.

2013-08-29 Thread Ray Bellis
On 21 Aug 2013, at 11:00, Geoff Huston g...@apnic.net wrote: Yes, our goal was to test out the asserting in RFC5966 that: The majority of DNS server operators already support TCP and we wanted to see if we could quantify what that majority actually was. [I've been on holiday, so apologies

Re: [dns-operations] Who is xn--j1amh.? Well, the general problem...

2013-03-20 Thread Ray Bellis
On 20 Mar 2013, at 13:35, Jaap Akkerhuis j...@nlnetlabs.nl wrote: Whatalways cracks me up on this page is that all IDNs are sorted under the X (because of XNN- I assume). Does a sensible sorting order for characters from different character sets even exist? The only one I can think of is by

Re: [dns-operations] Who is xn--j1amh.? Well, the general problem... {Sender Address Possibly Forged}

2013-03-20 Thread Ray Bellis
On 20 Mar 2013, at 14:19, Ray Bellis ray.bel...@nominet.org.uk wrote: Does a sensible sorting order for characters from different character sets even exist? The only one I can think of is by strict code point value, but then that would produce incorrect results for those languages whose

Re: [dns-operations] DNS TCP performance testing

2013-03-08 Thread Ray Bellis
On 8 Mar 2013, at 11:21, Wolfgang Nagele wolfgang.nag...@ausregistry.com.au wrote: Hi, Any tool recommendations for DNS performance testing when using TCP as a transport? dnsperf and all others I know only do UDP. I've previously used tcpreplay with the --pps option to replay a real

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-26 Thread Ray Bellis
On 25 Feb 2013, at 20:11, wbr...@e1b.orgmailto:wbr...@e1b.org wrote: I'm not a guru on much of the consumer equipment, but what I have seen allows you to use whatever DNS settings are pushed out by the ISP as part of DHCP. Just leave that box ticked and you get the ISP's idea of the proper DNS

Re: [dns-operations] which software is easier to setup a geo-based dns?

2012-10-08 Thread Ray Bellis
On 7 Oct 2012, at 18:09, Matthew Ghali mgh...@snark.net wrote: To unbias the recommendation a bit more, I agree with Bert. I've used nearly all the servers you mentioned, and built a largish DNS service product around PowerDNS, after looking at my options as well. The one you don't mention

Re: [dns-operations] query source port 53, was Re: Why would an MTA issue an ANY query instead of an MX query?

2012-06-13 Thread Ray Bellis
On 13 Jun 2012, at 00:56, Mark Andrews wrote: Both firewall configuration are broken. You don't look at source ports if you are offering a service. Although BIND does drop queries from source port 7 and a couple others... ;-) Ray ___